您好,欢迎来到聚文网。 登录 免费注册
计算机网络教程:自顶向下方法(英文版)

计算机网络教程:自顶向下方法(英文版)

  • 装帧: 平装
  • 出版社: 机械工业出版社
  • 作者: (美)佛罗赞,(美)莫沙拉夫 著
  • 出版日期: 2012-03-01
  • 商品条码: 9787111374305
  • 版次: 1
  • 开本: 其他
  • 页数: 931
  • 出版年份: 2012
定价:¥79 销售价:登录后查看价格  ¥{{selectedSku?.salePrice}} 
库存: {{selectedSku?.stock}} 库存充足
{{item.title}}:
{{its.name}}
精选
内容简介
    《计算机网络教程:自顶向下方法(英文版)》是计算机领域知名作者forouzan按照目前计算机网络教学比较流行的自顶向下方法编写的一部重要教材。本书延续了forouzan一贯的风格,以通俗易懂的方式全面阐述了计算机网络原理及其应用,并介绍了一些目前计算机网络发展的新技术。此外,每章都配有丰富的练习集(包括测试题、练习题、思考题),部分章节还包含仿真实验和编程作业,有助于读者巩固所学知识,提高动手实践能力。
    本书特色
    协议分层:本书利用internet协议分层和tcp/ip协议族讲授网络原理,强调各层网络理论之间的相互关系。
    自顶向下:从应用层开始,尽早让读者理解网络设备如何工作,然后讨论其他各层,最后介绍物理层。
    形象直观:采用图文并茂的方法描述技术性很强的问题,较少涉及复杂的数学公式,便于读者理解相关概念。
    举例和应用:以丰富的实例,阐明相关概念,并添加了一些现实中的应用,激发读者的学习热情。
目录
  preface v
chapter 1 introduction
  1.1 overview of the internet
  1.1.1 networks
  1.1.2 switching
  1.1.3 the intemet
  1.1.4 accessing the intemet
  1.1.5 hardware and software
  1.2 protocol layering
  1.2.1 scenarios
  1.2.2 tcp/ip protocol suite
  1.2.3 the esi model
  1.3 internet history
  1.3.1 early history
  1.3.2 birth of the intemet
  1.3.3 intemet today
  1.4 standards and administration
  1.4.1 intemet standards
  1.4.2 intemet administration
  1.5 end-chapter materials
  1.5.1 further reading
  1.5.2 key terms
  1.5.3 summary
  1.6 practice set
  1.6.1 quizzes
  1.6.2 questions
  1.6.3 problems
  1.7 simulation experiments
  1.7.1 applets
  1.7.2 lab assignments
chapter 2 application layer
  2.1 introduction
  2.1.1 providing services
  2.1.2 application-layer paradigms
  2.2 client-server paradigm
  2.2.1 application programming interface
  2.2.2 using services of the transport layer
  2.3 standard client-server applications
  2.3.1 world wide web and http
  2.3.2 ftp
  2.3.3 electronic mail
  2.3.4 telnet
  2.3.5 secure shell (ssh)
  2.3.6 domain name system (dns)
  2.4 peer-to-peer paradigm
  2.4.1 p2p networks
  2.4.2 distributed hash table (dht)
  2.4.3 chord
  2.4.4 pastry
  2.4.5 kademlia
  2.4.6 a popular p2p network: bittorrent
  2.5 socket interface programming
  2.5.1 socket interface in c
  2.6 end-chapter materials
  2.6.1 further reading
  2.6.2 key terms
  2.6.3 summary
  2.7 practice set
  2.7.1 quizzes
  2.7.2 questions
  2.7.3 problems
  2.8 simulation experiments
  2.8.1 applets
  2.8.2 lab assignments
  2.9 programming assignment
chapter 3 transport layer
  3.1 introduction
  3.1.1 transport-layer services
  3.2 transport-layer protocols
  3.2.1 simple protocol
  3.2.2 stop-and-wait protocol
  3.2.3 go-back-n protocol (gb'n)
  3.2.4 selective-repeat protocol
  3.2.5 bidirectional protocols: piggybacking
  3.2.6 intemet transport-layer protocols
  3.3 user datagram protocol (udp)
  3.3.1 user datagram
  3.3.2 udpservices
  3.3.3 udp applications
  3.4 transmission control protocol (tcp)
  3.4.1 tcp services
  3.4.2 tcp features
  3.4.3 segment
  3.4.4 a tcp connection
  3.4.5 state transition diagram
  3.4.6 windows in tcp
  3.4.7 flow control
  3.4.8 error control
  3.4.9 tcp congestion control
  3.4.10 tcp timers
  3.4.11 options
  3.5 end-chapter materials
  3.5.1 further reading
  3.5.2 key terms
  3.5.3 summary
  3.6 practice set
  3.6.1 quizzes
  3.6.2 questions
  3.6.3 problems
  3.7 simulation experiments
  3.7.1 applets
  3.7.2 lab assignments
  3.8 programming assignment
chapter 4 network layer
  4.1 introduction
  4.1.1 network-layer services
  4.1.2 packet switching
  4.1.3 network-layer performance
  4.1.4 network-layer congestion
  4.1.5 structure of a router
  4.2 network-layer protocols 26!
  4.2.1 ipv4 datagram format
  4.2.2 ipv4 addresses
  4.2.3 forwarding of ip packets
  4.2.4 icmpv4
  4.3 unicast routing
  4.3.1 general idea
  4.3.2 routing algorithms
  4.3.3 unicast routing protocols
  4.4 multicast routing
  4.4.1 introduction
  4.4.2 multicasting basics
  4.4.3 intradomain routing protocols
  4.4.4 interdomain routing protocols
  4.5 next generation ip
  4.5.1 packet format
  4.5.2 ipv6 addressing
  4.5.3 transition from ipv4 to ipv6
  4.5.4 icmpv6
  4.6 end-chapter materials
  4.6.1 further reading
  4.6.2 key terms
  4.6.3 summary
  4.7 practice set
  4.7.1 quizzes
  4.7.2 questions
  4.7.3 problems
  4.8 simulation experiments
  4.8.1 applets
  4.8.2 lab assignments
  4.9 programming assignment
chapter 5 data-link layer: wired networks
  5.1 introduction
  5.1.1 nodes and links
  5.1.2 two types of links
  5.1.3 two sublayers
  5.2 data link control (dlc)
  5.2.1 framing
  5.2.2 flow and error control
  5.2.3 error detection and correction
  5.2.4 two dlc protocols
  5.3 multiple access protocols
  5.3.1 random access
  5.3.2 controlled access
  5.3.3 channelization
  5.4 link-layer addressing
  5.5 wired lans: ethernet protocol
  5.5.1 ieee project 802
  5.5.2 standard ethernet
  5.5.3 fast ethernet (100 mbps)
  5.5.4 gigabit ethernet
  5.5.5 10-gigabit ethernet
  5.5.6 vh'tual lans
  5.6 other wired networks
  5.6.1 point-to-point networks
  5.6.2 sonet
  5.6.3 switched network: atm
  5.7 connecting devices
  5.7.1 repeaters or hubs
  5.7.2 link-layer switches
  5.7.3 routers
  5.8 end-chapter materials
  5.8.1 recommended reading
  5.8.2 key terms
  5.8.3 summary
  5.9 practice set
  5.9.1 quizzes
  5.9.2 questions
  5.9.3 problems
  5.10 simulation experiments
  5.10.1 applets
  5.10.2 lab assignments
  5.11 programming assignments
chapter 6 wireless networks and mobile ip
  6.1 wireless lans
  6.1.1 introduction
  6.1.2 ieee 802.11project
  6.1.3 bluetooth
  6.1.4 wimax
  6.2 other wireless networks
  6.2.1 channelization
  6.2.2 cellular telephony
  6.2.3 satellite networks
  6.3 mobile ip
  6.3.1 addressing
  6.3.2 agents
  6.3.3 three phases
  6.3.4 inefficiency in mobile ip
  6.4 end-chapter materials
  6.4.1 further reading
  6.4.2 key terms
  6.4.3 summary
  6.5 practice set
  6.5.1 quizzes
  6.5.2 questions
  6.5.3 problems
  6.6 simulation experiments
  6.6.1 applets
  6.6.2 lab assignments
  6.7 programming assignment
chapter 7 physical layer and transmission media
  7.1 data and signals
  7.1.1 analog and digital
  7.1.2 transmission impairment
  7.1.3 data rate limits
  7.1.4 performance
  7.2 digital transmission
  7.2.1 digital-to-digital conversion
  7.2.2 analog-to-digitalconversion
  7,3 analog transmission
  7.3.1 digital-to-analog conversion
  7.3.2 analog-to-analog conversion
  7.4 bandwidth utilization
  7.4.1 multiplexing
  7.4.2 spread spectrum
  7.5 transmission media
  7.5.1 guided media
  7.5.2 unguided media: wireless
  7.6 end-chapter materials
  7.6.1 recommended reading
  7.6.2 key terms
  7.6.3 summary
  7.7 practice set
  7.7.1 quizzes
  7.7.2 questions
  7.7.3 problems
chapter 8 multimedia and quality of service
  8.1 compression
  8.1.1 lossless compression
  8.1.2 lossy compression
  8.2 multimedia data
  8.2.1 text
  8.2.2 image
  8.2.3 video
  8.2.4 audio
  8.3 multimedia in the internet
  8.3.1 streaming stored audio/video
  8.3.2 streaming live audio/video
  8.3.3 real-time interactive audio/video
  8.4 real-time interactive protocols
  8.4.1 rationale for new protocols
  8.4.2 rtp
  8.4.3 rtcp
  8.4.4 session initialization protocol (sip)
  8.4.5 h.323
  8.4.6 sctp
  8.5 quality of service
  8.5.1 data-flow characteristics
  8.5.2 flow classes
  8.5.3 flow control to improve qos
  8.5.4 integrated services (intserv)
  8.5.5 differentiated services (diffserv)
  8.6 end-chapter materials
  8.6.1 recommended reading
  8.6.2 key terms
  8.6.3 summary
  8.7 practice set
  8.7.1 quizzes
  8.7.2 questions
  8.7.3 problems
  8.8 simulation experiments
  8.8.1 applets
  8.8.2 lab assignments
  8.9 programming assignments
chapter 9 network management
  9.1 introduction
  9.1.1 configuration management
  9.1.2 fault management
  9.1.3 performance management
  9.1.4 security management
  9.1.5 accounting management
  9.2 snmp
  9.2.1 managers and agents
  9.2.2 management components
  9.2.3 an overview
  9.2.4 smi
  9.2.5 mib 7t
  9.2.6 snmp
  9.3 asn. 1
  9.3.1 language basics
  9.3.2 data types
  9.3.3 encoding
  9.4 end-chapter materials
  9.4.1 further reading
  9.4.2 key terms
  9.4.3 summary
  9.5 practice set
  9.5.1 quizzes
  9.5.2 questions
  9.5.3 problems
chapter 10 network security
  10.1 introduction
  10.1.1 security goals
  10.1.2 attacks
  10.1.3 services and techniques
  t 0.2 confidentiality
  10.2.1 symmetric-key ciphers
  10.2.2 asymmetric-key ciphers
  10.3 other aspects of security
  10.3.1 message integrity
  10.3.2 message authentication
  10.3.3 digital signature
  10.3.4 entity authentication
  10.3.5 key management
  10.4 internet security
  10.4.1 application-layer security
  10.4.2 transport-layer security
  10.4.3 network-layer security
  10.5 firewalls
  10.5.1 packet-filter firewall
  10.5.2 proxy firewall
  10.6 end-chapter materials
  10.6.1 further reading
  10.6.2 key terms
  10.6.3 summary
  10.7 practice set
  10.7.1 quizzes
  10.7.2 questions
  10.7.3 problems
  10.8 simulation experiments
  10.8.1 applets
  10.8.2 lab assignments
  10.9 programming assignments
chapter 11 socket programming in java
  11.1 introduction
  11.1.1 addresses and ports
  11.1.2 client-server paradigm
  11.2 programming with udp
  11.2.1 iterative approach
  11.2.2 concurrent approach
  11.3 programming with tcp
  11.3.1 iterative approach
  11.3.2 concurrent approach
  11.4 end-chapter materials
  11.4.1 further reading
  11.4.2 key terms
  11.4.3 summary
  11.5 practice set
  11.5.1 quizzes
  11.5.2 questions
  11.5.3 problems
  11.6 programming assignments
  appendix a unicode
  appendix b positional numbering system
  appendix c html, css, xml, and xsl
  appendix d miscellaneous information
  appendix e 8b/6t code
glossary
references
index

    

蜀ICP备2024047804号

Copyright 版权所有 © jvwen.com 聚文网